Note: This is an archival copy of Security Sun Alert 201440 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1001085.1.
Sun Cobalt Qube 3 Server
Sun Cobalt RaQ XTR Server
Sun Cobalt RaQ 4 Server
Sun Cobalt RaQ 550 Server
Date of Resolved Release
The Vi Improved (VIM) package may give unprivileged users the ability to execute arbitrary commands. VIM allows a user to set the modeline differently for each edited text file and allows the addition of "special comments" in those files. These comments can be modified to call external programs.
This vulnerability of the modeline function could allow an unprivileged user who has system access the ability to create a text file such that when it is opened, arbitrary or malicious commands are executed.
This issue is described at:
Note: VIM (Vi IMproved) is a version of the vi editor.
This issue can occur in the following releases:
The VIM package version can be determined by running the following command, as in the example below:
# rpm -q vim-common vim-common-6.0-7.13
There are no predictable symptoms that would indicate the above described issue has been exploited.
There is no workaround. Please see the "Resolution" section below.
This issue is addressed in the following releases:
Sun Linux 5.0
The above packages can all be found at: ftp://ftp.cobalt.sun.com/pub/products/sunlinux/5.0/en/updates/i386/RPMS
This solution has no attachment